CN - 2-Mark-Q-Bank - (Unit-I, Ii)
CN - 2-Mark-Q-Bank - (Unit-I, Ii)
CN - 2-Mark-Q-Bank - (Unit-I, Ii)
COMPUTER NETWORKS
PART A
UNIT – I
2. What are the three criteria necessary for an effective and efficient network?
7. For n devices in a network, what is the number of cable links required for a
mesh and ring topology?
An active hub contains a repeater that regenerates the received bit patterns before sending
them out. A passive hub provides a simple physical connection between the attached
devices.
9. Assume 6 devices are arranged in a mesh topology. How many cables are
needed? How many ports are needed for each device?
The seven layers of the OSI model belonging to three subgroups. Physical, data link and
network layers are the network support layers; they deal with the physical aspects of
moving data from one device to another. Session, presentation and application layers are
the user support layers; they allow interoperability among unrelated software systems.
The transport layer ensures end-to-end reliable data transmission.
11. What are header and trailers and how do they get added and removed?
Each layer in the sending machine adds its own information to the message it receives
from the layer just above it and passes the whole package to the layer just below it. This
information is added in the form of headers or trailers. Headers are added to the message
at the layers 6,5,4,3, and 2. A trailer is added at layer2. At the receiving machine, the
headers or trailers attached to the data unit at the corresponding sending layers are
removed, and actions appropriate to that layer are taken.
12. The transport layer creates a communication between the source and
destination. What are the three events involved in a connection?
Creating a connection involves three steps: connection establishment, data transfer and
connection release.
Transceiver is a small device directly attached to the tap and detects when the line is idle
and drives the signal when the host is transmitting.
Ethernet host in the world has a unique address. The address belongs to the adaptor, not
the host; it is usually burned into ROM. it has six hexadecimal numbers separated by
colons. Example 8:0:2b:e4:b1:2.
Once an adaptor has detected a collision and stopped its transmission, it waits a certain
amount of time and tries again. Each time it tries to transmit but fails, the adaptor doubles
the amount of time it waits before trying again. This strategy of doubling the delay
interval between each transmission attempt is a general technique known as exponential
back off.
• FDDI uses a ring topology of multimode or single mode optical fiber transmission links
operating at 100 Mbps to span up to 200 kms and permits up to 500 stations.
• Employs dual counter-rotating rings.
• 16 and 48-bit addresses are allowed.
• In FDDI, token is absorbed by station and released as soon as it completes the frame
transmission {multi-token operation}.
10Base5 - An Ethernet term meaning a maximum transfer rate of 10 Megabits per second
that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per
segment.
10BaseT - An Ethernet term meaning a maximum transfer rate of 10 Megabits per second
that uses baseband signaling and twisted pair cabling. All these 3 are related to Ethernet
cables, where 10base2 can define as maximum rate of data transfer is 10megabits per
second ,B stand for baseband signaling and 2 is for 200 meter of length... this is same for
10base5 but where in 10baset T stands for twisted pair of cable
26. What is the difference between physical address and logical address?
A Physical address is a 48-bit flat address burned into the ROM of the NIC card which is
a Layer1 device of the OSI model. This is divided into 24-bit vendor code and 24-bit
serial address. This is unique for each system and cannot be changed. A Logical address
is a 32- bit address assigned to each system in a network. This works in Layer-3 of OSI
Model. This would be generally the IP address. Simply we can say that Physical address
is MAC address (Media Access Control) which inbuilt and Logical Address is the IP
which is given manually.
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the
48 bit physical address, used by a host or a router to find the physical address of another
host on its network by sending a ARP query packet that includes the IP address of the
receiver. ARP-Address resulution protocol Used to find the physical address if it knows
the logical address.
The reverse address resolution protocol (RARP) allows a host to discover its Internet
address when it knows only its physical address. RARP-Reverse address resolution
protocol Used to find the logical address if it knows the physical address.
28. What are the advantages of FDDI over a basic Token Ring?
Fiber Distributed Data Interface (FDDI) is a LAN protocol using optical fiber as a
medium, with a 100Mbps data rate.
UNIT-II
DATA LINK LAYER
Single bit error: The term single bit error means that only one bit of a given data unit
(such as byte character/data unit or packet) is changed from 1 to 0 or from 0 to 1.
Burst error: Means that 2 or more bits in the data unit have changed from 1 to 0 from
0 to 1.
4. What is redundancy?
It is the error detecting mechanism, which means a shorter group of bits or extra bits may
be appended at the destination of each unit.
The most common and least expensive mechanism for error detection is the vertical
redundancy check (VRC) often called a parity check. In this technique a redundant bit
called a parity bit, is appended to every data unit so, that the total number of 0’s in the
Unit (including the parity bit) becomes even.
The third and most powerful of the redundancy checking techniques is the cyclic
redundancy checks (CRC) CRC is based on binary division. Here a sequence of
redundant bits, called the CRC remainder is appended to the end of data unit.
A CRC checker functions exactly like a generator. After receiving the data appended with
the CRC it does the same modulo-2 division. If the remainder is all 0’s the CRC is
dropped and the data accepted. Otherwise, the received stream of bits is discarded and the
dates are resent.
The error detection method used by the higher layer protocol is called checksum.
Checksum is based on the concept of redundancy.
A hamming code can be designed to correct burst errors of certain lengths. So the simple
strategy used by the hamming code to correct single bit errors must be redesigned to be
applicable for multiple bit correction.
Flow control refers to a set of procedures used to restrict the amount of data. The sender
can send before waiting for acknowledgment.
Each receiving device has a block of memory called a buffer, reserved for storing
incoming data until they are processed.
There are 2 methods have been developed to control flow of data across communication
links.
a) Stop and wait- send one from at a time.
b) Sliding window- send several frames at a time.
24. What is the purpose of the timer at the sender site in systems using ARQ?
The sender starts a timer when it sends a frame. If an acknowledgment is not received
within an allotted time period, the sender assumes that the frame was lost or damaged and
resends it.
39. How can the parity bit detect a damaged data unit?
In parity check, (a redundant bit) a parity bit is added to every data unit so that the total
number of 1s is even for even parity checking function (or odd for odd parity).
40. How can we use the Hamming code to correct a burst error?
By rearranging the order of bit transmission of the data units, the Hamming code can
correct burst errors.
41. What is Byte Stuffing?
Byte stuffing is the process of adding 1 extra byte whenever there is a flag or escape
character in the text.
42. What are the three protocols used for noisy channels?
Stop – and – Wait ARQ ,Go – back – N ARQ, Selective Repeat ARQ
Flow Control: It refers to a set of procedures used to restrict the amount of data that the
sender can send before waiting for acknowledgment.
Bit stuffing is the process of adding one extra 0 whenever five consecutive 1s follow a 0
in the data, so that the receiver does not mistake the pattern 01111110 for a flag.
Bit stuffing is the process of adding one extra 0 whenever there are five consecutive 1s
in the data, sothat the receiver does not mistake the data for a flag.
The number of corresponding bits that differ between two codewords is the Hamming
distance of those two codewords. For example, the Hamming distance between the
codewords 1001 and 0101 is 2. The Hamming distance of two codewords can be
calculated as the number of 1 bits in the bitwise exclusive-or of the two codewords: 1001
xor 0101 = 1100.
A code is the set of all codewords of a given length that are constructed by adding a
specified number of check digits in a specified way to a specified number of data bits.
The minimum Hamming distance of a code is the minimum of the Hamming distance
between all possible pairs of codewords of that code.
Go-Back-N ARQ
It may be (slightly) more efficient than Go-back-n ARQ, but also much more
complicated.
flow control specifies how much data the Sender can transmit before receiving
permission to continue from the Receiver
error control allows the Receiver to tell the Sender about frames damaged or lost during
transmission, and coordinates the re-transmission of those frames by the Sender
50. What is the window size for Go back N and Selective repeat
Go Back N : < 2m
Selective Repeat : 2m - 1